Sciweavers

24 search results - page 1 / 5
» issa 2004
Sort
View
92
Voted
CI
2004
81views more  CI 2004»
15 years 2 months ago
Detecting New Forms of Network Intrusion Using Genetic Programming
Wei Lu, Issa Traoré
98
Voted
ISSA
2004
15 years 3 months ago
Legality Of Monitoring E-Mail At The Workplace: A Legal Update
It seems fair to assume that employers provide e-mail facilities to employees as tools intended for workrelated activity. As such it further seems fair to assume that employers wo...
Mariette Jones
103
Voted
ISSA
2004
15 years 3 months ago
Propagating Trust In The Web Services Framework
In this paper, we discuss one possible way of establishing trust between a user entity and a web service. We will assume that the user entity is machine-based (i.e. some software,...
Anitta Thomas
144
Voted
ISSA
2004
15 years 3 months ago
An Investigation Into Computer Forensic Tools
Cyber-crime has reached unprecedented proportions in this day and age. In addition, the internet has created a world with seemingly no barriers while making a countless number of ...
K. K. Arthur